Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
5dbec7064d1d242e3461a8ed1df75444_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5dbec7064d1d242e3461a8ed1df75444_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5dbec7064d1d242e3461a8ed1df75444_JaffaCakes118.html
-
Size
175KB
-
MD5
5dbec7064d1d242e3461a8ed1df75444
-
SHA1
654a178388c8abec7c77bae4793bfdb113113d3e
-
SHA256
9f2774c7805de7789d893917148241820f94f1b466d08bf14a56c4712a4e1647
-
SHA512
9654288edabbbe5761d82eac20b56705429b0142f93180043d57ceed8c7bde166efa3fbeb5a50c975065e735372e1c682860aa916a53f71df8e273df66aec6dd
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3xGNkFEYfBCJiZs+aeTH+WK/Lf1/hpnVSV:S9CT3x/FxBCJinB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1684 msedge.exe 1684 msedge.exe 1792 msedge.exe 1792 msedge.exe 2196 identity_helper.exe 2196 identity_helper.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 876 1792 msedge.exe 83 PID 1792 wrote to memory of 876 1792 msedge.exe 83 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 2368 1792 msedge.exe 84 PID 1792 wrote to memory of 1684 1792 msedge.exe 85 PID 1792 wrote to memory of 1684 1792 msedge.exe 85 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86 PID 1792 wrote to memory of 4656 1792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5dbec7064d1d242e3461a8ed1df75444_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3892261502111992600,12144191463508977140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
19KB
MD5aaace359b85b7b4a2c7327dfb7beaa97
SHA1582d8a59ced081f5fcda3e35721f8a3464927a74
SHA256ed67895dc54bd5d6b94b889380288aa1bd1efbe14dd06ce4fa63794002994ee1
SHA51268b908c77fb16a195cccfe531060ff7d5e0fa97bdb58ac860ea5d8c0f04e49ab3bf906839a971c4208360688153c9362e81054124f88d2dffb4101a065de1f0d
-
Filesize
797KB
MD56532c7609ee1bb2692df2438ddc88fc3
SHA1deac88a25324f16a9474aa92a7134a06f8b55371
SHA2563ba8a3eb3401dbeb13e10370833a3cfaed13ccbb5750ff49e4709735b0304fa4
SHA51206238022c59b42cb1dda20c9a0fd550bb9899c0428da0daefdfcb41931541e7d1ce4f3a6b3b86cc572f3eedc5dae51d4a5c185ff61bebaf93f3a4cdd7042a2ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD57b046947a21598f8a8182a2a28a2d77b
SHA15c4bb08f3cc51ba9374a08c2bd0ba2c808988ad0
SHA256ad7740e3d60eaaaaf3d2b6369072a126f5d5d12d6038633e677d059a695c2792
SHA512d17cf943d2039932eaf016a27c40544b71b99709d1928b6f59da7ec69d51e0f0cb43c2d65061d6e000a36cac8a0ca3a1d26c58e9af8e3cb45335b56790e8c3bc
-
Filesize
2KB
MD51c65e2e781ff9843543361acd43e9d88
SHA19f9ac2d6809717350eb8c25509d96e75c3492b0a
SHA256e480bc6e5f6ea7ec6a33695a13a244be756c988d74a993e4adf1dd30f69e0e84
SHA5122094b9c09a6518c5da01063a1f9ca7918fe29d13e47205b949303b2176972a0719922c0c9ebc844389d1bedff3f75d8e76d1473da79edde4b0568789cd47ac28
-
Filesize
2KB
MD5fcd02caf51c623d3d6f9ae0aa9c64634
SHA1a8e0fb6f4f93ffc0e6da77debe924d54c890f413
SHA2566eb88ad1d2376a9895ed3998252d45509a8ef684ebf295659ba72e04ff3d50e2
SHA512a4245ee9ac5d4cf7d32dd67407af77228db523ad5a9fc17a74c975c5e746f20426fdba962aa53c864295992fc12b79a2765e875d23eaab5e54a9957143cc88ec
-
Filesize
5KB
MD52f3abe724b62da093ba5b8c5a6db742c
SHA1faeeb9bc393385c027344ef050674f37e285cbb2
SHA25696dd9449670ade1efade4325ac4a494df8906d42119d5094f89092a215d4b0f1
SHA512052e95cd4c5bf33d47afb8ad266f8b879de639cc527bc0667a865794502492017a2fa683494be3174fc9ff5da0f93d65c0d67a1f5ad99e8b3c542a8dab8e0ba8
-
Filesize
7KB
MD59af7f34009a08fcfa33631e65e55c435
SHA143ed31ae7f4c8a1fc1e2bfc4b6ad48dfd8b44012
SHA256aa9190f5093f9a83c7c1b92dda4f5442b0f0c02be072c216790353cf98601443
SHA51231dfe77f4a01c9a24cef353ebd057261c58cf2213f83111acb9f9651a68418b8975d642e13563346a1eba8f9ce021126cc698e0d25b795ed63e47b51b41891d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD593acf673b89caaa1d08243503ccd69ff
SHA1813099329a92e0f84329780c532f795d430688a5
SHA25612107e5fb09a83483030c43ac0d12602a7e0283f8ea63d25860936d7c9d096e7
SHA512c6ab5aad9bd8b63cfca52753ef25a28c763b8831e988996e5477d020100dbe3b15c8c5842e292c0308990604e9ff117f66cf0eccba1713f60f9ee886bf64b13a